Antivirus

High volume malware infections always claim the headlines, especially if they end-up operating in the same generation. Emotet, LokiBot, and TrickBot are the three strongest contenders as the malware to watch-out for this 2019, based on their infection campaigns from last year. Emotet is a multifunction malware, with it, the user’s credential can be stolen,

Each major antivirus vendor has their own malware researchers, antivirus signatures, heuristics, and proprietary malware detection technologies. Malware is now a greater problem than ever before—for enterprises, consumers, and organizations large and small. When it comes to detecting known malware and increasingly sophisticated zero-day attacks, each vendor tries to stay ahead of the game. The rise

Businesses of all sizes have been investing in security software and fundamental cybersecurity infrastructure for decades. The antivirus industry has grown into a huge industry on its own from its humble beginnings of just being a small utility a user can optionally be bought and came with a floppy disk media. In fact, the very

Android has been on the market since 2008, and this year 2018 marks a decade of dominance in the world of mobile platforms. As part of being dominant in the mobile computing market comes the reciprocal risk of being targeted by cybercriminals. Android, due to its open platform nature enables users the capability to install

Stay Connected

134Followers

245Fans

303Followers

3Followers

Get more stuff

like this in your inbox

We respect your privacy and take protecting it seriously

An Introduction To Carlos Solari

Writing exclusively for The Threat Report, Carlos Solari brings significant wisdom and experience to the security conversation, aligning what he's learned through the years, both personally and professionally, with the current challenges we face in the modern world of technology. From his childhood in Columbia to his days at the FBI to his role as White House CIO, Carlos will share his unique knowledge of key areas like collaboration, communication, investigation, forensics, attack, defense, rule of law, accountability, and the ongoing relationship between science and technology—including the reality of what happens when these things break down. Every Sunday, his Lessons will help us visualize the evolution of cybersecurity and its inherent need for better design and application—lessons we must come to understand if we hope to survive in the digital age.
Click here to read Articles

The materials on this website may not be modified, distributed, posted or transmitted without the prior written consent of Hacker Combat LLC. 1997-2018 All rights reserved.

The information contained in this website is provided for reference purposes only and not for investment or for any other purposes. For complete information please contact us directly. Please review the Terms of Use before using this site. Your use of the site indicates your agreement to be bound by the Terms of Use.